Max & Co: I've just seen I'm using kernel config 'options IPSEC' on both machines. Should I try 'options FAST_IPSEC'? Would take some hours for kernel recompile. Does the code IPSEC / FAST_IPSEC make a difference (even while having not hardware crypto accelerator)?
May I use FAST_IPSEC even without any hw-crypto devices? While reading `man fast_ipsec' I would think it depends on a hw-crypto device... Please tell me if we should check IPSEC / FAST_IPSEC and I'll start a recompile. Volker On 2005-10-23 00:40, Max Laier wrote: > To try something else: Could you guys try to disable SACK on the machines > involved? I haven't looked at the dumps as of yet, but that's one simple > test that might help to identify the problem. > > sysctl net.inet.tcp.sack.enable=0 > > On Sunday 23 October 2005 02:23, Volker wrote: > >>Michael, >> >>I not that sure if I'm right in checking what you suggested but when >>trying to do ping hostB from hostA with oversized packets through the >>IPSec tunnel by: >> >># ping -c 10 -s 12000 10.128.6.1 >> >>I'm getting replies easily. >> >>While doing that and tcpdump'ing the gif interface, I'm seeing the >>fragmented packets coming in properly. >> >>If that's a reliable check for MTU than the problem should not be MTU >>related. Is there any other way to check MTU problems by using `ping'? >> >>Thanks, >> >>Volker >> >>On 2005-10-22 20:16, Michael VInce wrote: >> >>>Try sending different sized pings or other packet size control utils to >>>really make sure its not MTU related. >>>Maybe there is an upstream router thats blocking ICMP fragment packets, >>>have you ever seen them? try forcing the creation of some. >>> >>>Mike >>> >>>Volker wrote: >>> >>>>Still having the same problem with an IPSec tunnel between FreeBSD 5.4R >>>>hosts. >>>> >>>>Problem description: >>>>scp session tries to transfer a large file through an IPSec tunnel. The >>>>file is being transmitted but scp says 'stalled' after 56K (49152 bytes >>>>file size). The IPSec tunnel itself is still up even after the scp >>>>abort. Other tcp sessions break, too when sending too much traffic >>>>through the tunnel. >>>> >>>>I've taken a closer look to it and tried to get something useful out of >>>>the tcpdump but I'm unable to see any errors or I'm misinterpreting >>>>something. >>>> >>>>The connection looks like: >>>> >>>>extIP: A.B.C.D >>>>extIP: E.F.G.H >>>>host A ------------------ (internet) ------------------ host B >>>>tunnelIP: 10.128.1.6 tunnelIP: >>>>10.128.6.1 >>>> >>>>host A just has an external interface (em1) connected to a leased line >>>>with a fixed IP address (IP-addr A.B.C.D). >>>>host B has an S-DSL connection at xl0, PPPoE at ng0 (IP-addr. E.F.G.H). >>>> >>>>Both hosts are using gif for the IPSec tunnel. >>>> >>>>The routing tables (netstat -rnWf inet) are looking good and IMHO the >>>>MTU is fine. >>>> >>>>host A: >>>>em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 >>>> options=b<RXCSUM,TXCSUM,VLAN_MTU> >>>> inet A.B.C.D netmask 0xfffffff8 broadcast A.B.C.z >>>> ether 00:c0:9f:46:ec:c7 >>>> media: Ethernet autoselect (100baseTX <full-duplex>) >>>> status: active >>>>gif6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 >>>> tunnel inet A.B.C.D --> E.F.G.H >>>> inet 10.128.1.6 --> 10.128.6.1 netmask 0xffffffff >>>> inet6 fe80::2c0:9fff:fe46:ecc6%gif6 prefixlen 64 scopeid 0x4 >>>> >>>>Routing tables (shortened) >>>>Destination Gateway Flags Refs Use Mtu >>>>Netif Expire >>>>default A.B.C.x UGS 2 516686 1500 em1 >>>>10.128.1.6 127.0.0.1 UH 0 14 >>>>16384 lo0 >>>>10.128.6.1 10.128.1.6 UH 0 6017 >>>>1280 gif6 >>>>127.0.0.1 127.0.0.1 UH 0 31633 >>>>16384 lo0 >>>>A.B.C.x/29 link#2 UC 0 0 1500 em1 >>>>A.B.C.D 00:c0:9f:46:ec:c7 UHLW 0 112 1500 lo0 >>>> >>>>On host B the interfaces and routing tables are looking like: >>>>xl0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 >>>> options=8<VLAN_MTU> >>>> inet 0.0.0.0 netmask 0xff000000 broadcast 0.255.255.255 >>>> inet6 fe80::260:8ff:fe6c:e73c%xl0 prefixlen 64 scopeid 0x1 >>>> ether 00:60:08:6c:e7:3c >>>> media: Ethernet 10baseT/UTP (10baseT/UTP <half-duplex>) >>>> status: active >>>>gif1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280 >>>> tunnel inet E.F.G.H --> A.B.C.D >>>> inet6 fe80::260:8ff:fe6c:e73c%gif1 prefixlen 64 scopeid 0x4 >>>> inet 10.128.6.1 --> 10.128.1.6 netmask 0xffffffff >>>>ng0: flags=88d1<UP,POINTOPOINT,RUNNING,NOARP,SIMPLEX,MULTICAST> mtu 1456 >>>> inet E.F.G.H --> 217.5.98.186 netmask 0xffffffff >>>> >>>>Routing tables (shortened) >>>>Destination Gateway Flags Refs Use Mtu >>>>Netif Expire >>>>0 link#1 UC 0 0 1500 >>>>xl0 => >>>>default 217.5.98.186 UGS 1 38474 >>>>1456 ng0 >>>>10.128.1.6 10.128.6.1 UH 4 2196 >>>>1280 gif1 >>>>127.0.0.1 127.0.0.1 UH 0 80424 >>>>16384 lo0 >>>>217.5.98.186 E.F.G.H UH 1 0 1456 ng0 >>>>E.F.G.H lo0 UHS 0 0 16384 lo0 >>>> >>>>While trying to fetch a file by scp on host A (receiver) from host B >>>>(sender), I captured the following tcpdump on host B: >>>> >>>>tcpdump -netttvvi gif1: >>>> >>>>>000023 AF 2 1280: IP (tos 0x8, ttl 64, id 13202, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>43864:45092(1228) ack 1330 win 33156 <nop,nop,timestamp 481770567 >>>>>565002838> >>>>>000207 AF 2 1280: IP (tos 0x8, ttl 64, id 52187, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>45092:46320(1228) ack 1330 win 33156 <nop,nop,timestamp 481770567 >>>>>565002838> >>>>>000220 AF 2 1280: IP (tos 0x8, ttl 64, id 33774, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>46320:47548(1228) ack 1330 win 33156 <nop,nop,timestamp 481770568 >>>>>565002838> >>>>>003524 AF 2 52: IP (tos 0x8, ttl 64, id 42063, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 38952 win 33156 <nop,nop,timestamp 565002844 >>>>>481770524> 000024 AF 2 1280: IP (tos 0x8, ttl 64, id 48541, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>47548:48776(1228) ack 1330 win 33156 <nop,nop,timestamp 481770571 >>>>>565002844> >>>>>011203 AF 2 52: IP (tos 0x8, ttl 64, id 60517, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 41408 win 32542 <nop,nop,timestamp 565002855 >>>>>481770530> 000058 AF 2 1280: IP (tos 0x8, ttl 64, id 15798, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>48776:50004(1228) ack 1330 win 33156 <nop,nop,timestamp 481770582 >>>>>565002855> >>>>>000246 AF 2 1280: IP (tos 0x8, ttl 64, id 31721, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>50004:51232(1228) ack 1330 win 33156 <nop,nop,timestamp 481770583 >>>>>565002855> >>>>>005147 AF 2 52: IP (tos 0x8, ttl 64, id 22347, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 42636 win 33156 <nop,nop,timestamp 565002861 >>>>>481770542> 000024 AF 2 1280: IP (tos 0x8, ttl 64, id 61057, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>51232:52460(1228) ack 1330 win 33156 <nop,nop,timestamp 481770588 >>>>>565002861> >>>>>020769 AF 2 52: IP (tos 0x8, ttl 64, id 27692, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 45092 win 32542 <nop,nop,timestamp 565002881 >>>>>481770547> 000027 AF 2 1280: IP (tos 0x8, ttl 64, id 64167, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>52460:53688(1228) ack 1330 win 33156 <nop,nop,timestamp 481770609 >>>>>565002881> >>>>>000209 AF 2 1280: IP (tos 0x8, ttl 64, id 45457, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>53688:54916(1228) ack 1330 win 33156 <nop,nop,timestamp 481770609 >>>>>565002881> >>>>>005260 AF 2 52: IP (tos 0x8, ttl 64, id 53832, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 46320 win 33156 <nop,nop,timestamp 565002887 >>>>>481770567> 000024 AF 2 1280: IP (tos 0x8, ttl 64, id 3515, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>54916:56144(1228) ack 1330 win 33156 <nop,nop,timestamp 481770614 >>>>>565002887> >>>>>011020 AF 2 52: IP (tos 0x8, ttl 64, id 11608, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 48776 win 32542 <nop,nop,timestamp 565002898 >>>>>481770568> 000026 AF 2 1280: IP (tos 0x8, ttl 64, id 5848, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>56144:57372(1228) ack 1330 win 33156 <nop,nop,timestamp 481770625 >>>>>565002898> >>>>>000211 AF 2 1280: IP (tos 0x8, ttl 64, id 39892, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>57372:58600(1228) ack 1330 win 33156 <nop,nop,timestamp 481770625 >>>>>565002898> >>>>>005641 AF 2 52: IP (tos 0x8, ttl 64, id 7943, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 50004 win 33156 <nop,nop,timestamp 565002904 >>>>>481770582> 000024 AF 2 1280: IP (tos 0x8, ttl 64, id 8678, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>58600:59828(1228) ack 1330 win 33156 <nop,nop,timestamp 481770631 >>>>>565002904> >>>>>011072 AF 2 52: IP (tos 0x8, ttl 64, id 38257, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 52460 win 32542 <nop,nop,timestamp 565002915 >>>>>481770583> 000025 AF 2 1280: IP (tos 0x8, ttl 64, id 12255, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>59828:61056(1228) ack 1330 win 33156 <nop,nop,timestamp 481770642 >>>>>565002915> >>>>>000209 AF 2 1280: IP (tos 0x8, ttl 64, id 46257, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>61056:62284(1228) ack 1330 win 33156 <nop,nop,timestamp 481770642 >>>>>565002915> >>>>>000222 AF 2 1280: IP (tos 0x8, ttl 64, id 4093, offset 0, flags >>>>>[none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>62284:63512(1228) ack 1330 win 33156 <nop,nop,timestamp 481770643 >>>>>565002915> >>>>>007065 AF 2 52: IP (tos 0x8, ttl 64, id 18720, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 53688 win 33156 <nop,nop,timestamp 565002922 >>>>>481770609> 000025 AF 2 1280: IP (tos 0x8, ttl 64, id 38378, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>63512:64740(1228) ack 1330 win 33156 <nop,nop,timestamp 481770650 >>>>>565002922> >>>>>011034 AF 2 52: IP (tos 0x8, ttl 64, id 18718, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 56144 win 32542 <nop,nop,timestamp 565002934 >>>>>481770609> 000024 AF 2 1280: IP (tos 0x8, ttl 64, id 8148, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.53160: . >>>>>64740:65968(1228) ack 1330 win 33156 <nop,nop,timestamp 481770661 >>>>>565002934> >>>>>005991 AF 2 52: IP (tos 0x8, ttl 64, id 62285, offset 0, flags >>>>>[none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum ok] >>>>>1330:1330(0) ack 57372 win 33156 <nop,nop,timestamp 565002939 >>>>>481770625> 010726 AF 2 52: IP (tos 0x8, ttl 64, id 1549, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum >>>>>ok] 1330:1330(0) ack 59828 win 32542 <nop,nop,timestamp 565002950 >>>>>481770625> 005670 AF 2 52: IP (tos 0x8, ttl 64, id 61504, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum >>>>>ok] 1330:1330(0) ack 61056 win 33156 <nop,nop,timestamp 565002956 >>>>>481770642> 011260 AF 2 52: IP (tos 0x8, ttl 64, id 32633, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum >>>>>ok] 1330:1330(0) ack 63512 win 32542 <nop,nop,timestamp 565002967 >>>>>481770642> 005510 AF 2 52: IP (tos 0x8, ttl 64, id 54614, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum >>>>>ok] 1330:1330(0) ack 64740 win 33156 <nop,nop,timestamp 565002973 >>>>>481770650> 104909 AF 2 52: IP (tos 0x8, ttl 64, id 50471, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.53160 > 10.128.6.1.22: . [tcp sum >>>>>ok] 1330:1330(0) ack 65968 win 33156 <nop,nop,timestamp 565003078 >>>>>481770661> >>>> >>>>tcpdump -netttvvi ng0 host A.B.C.D: >>>> >>>>>000227 AF 2 1352: IP (tos 0x8, ttl 64, id 25895, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x10b) >>>>>011042 AF 2 128: IP (tos 0x8, ttl 61, id 5786, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf0) >>>>>000226 AF 2 1352: IP (tos 0x8, ttl 64, id 36701, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x10c) >>>>>000216 AF 2 1352: IP (tos 0x8, ttl 64, id 8789, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x10d) >>>>>004853 AF 2 128: IP (tos 0x8, ttl 61, id 17128, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf1) >>>>>000227 AF 2 1352: IP (tos 0x8, ttl 64, id 34888, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x10e) >>>>>018747 AF 2 128: IP (tos 0x8, ttl 61, id 14828, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf2) >>>>>000248 AF 2 1352: IP (tos 0x8, ttl 64, id 34356, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x10f) >>>>>000223 AF 2 1352: IP (tos 0x8, ttl 64, id 34151, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x110) >>>>>005030 AF 2 128: IP (tos 0x8, ttl 61, id 45476, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf3) >>>>>000228 AF 2 1352: IP (tos 0x8, ttl 64, id 39765, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x111) >>>>>011247 AF 2 128: IP (tos 0x8, ttl 61, id 63692, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf4) >>>>>000226 AF 2 1352: IP (tos 0x8, ttl 64, id 29240, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x112) >>>>>000222 AF 2 1352: IP (tos 0x8, ttl 64, id 43306, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x113) >>>>>005663 AF 2 128: IP (tos 0x8, ttl 61, id 32980, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf5) >>>>>000228 AF 2 1352: IP (tos 0x8, ttl 64, id 56920, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x114) >>>>>010190 AF 2 128: IP (tos 0x8, ttl 61, id 3206, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf6) >>>>>000227 AF 2 1352: IP (tos 0x8, ttl 64, id 4655, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x115) >>>>>000215 AF 2 1352: IP (tos 0x8, ttl 64, id 62740, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x116) >>>>>000203 AF 2 1352: IP (tos 0x8, ttl 64, id 35642, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x117) >>>>>006875 AF 2 128: IP (tos 0x8, ttl 61, id 37801, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf7) >>>>>000234 AF 2 1352: IP (tos 0x8, ttl 64, id 41803, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x118) >>>>>010651 AF 2 128: IP (tos 0x8, ttl 61, id 54256, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf8) >>>>>000235 AF 2 1352: IP (tos 0x8, ttl 64, id 30732, offset 0, flags >>>>>[none], length: 1352) E.F.G.H > A.B.C.D: ESP(spi=0x078b2968,seq=0x119) >>>>>007913 AF 2 128: IP (tos 0x8, ttl 61, id 7647, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xf9) >>>>>011166 AF 2 128: IP (tos 0x8, ttl 61, id 58037, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xfa) >>>>>005483 AF 2 128: IP (tos 0x8, ttl 61, id 65275, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xfb) >>>>>011250 AF 2 128: IP (tos 0x8, ttl 61, id 47289, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xfc) >>>>>005505 AF 2 128: IP (tos 0x8, ttl 61, id 203, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xfd) >>>>>104747 AF 2 128: IP (tos 0x8, ttl 61, id 45263, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xfe) >>>>>8. 338674 AF 2 128: IP (tos 0x8, ttl 61, id 36351, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0xff) >>>>>319992 AF 2 128: IP (tos 0x8, ttl 61, id 18085, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x100) >>>>>441837 AF 2 128: IP (tos 0x8, ttl 61, id 58323, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x101) >>>>>684077 AF 2 128: IP (tos 0x8, ttl 61, id 35487, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x102) >>>>>1. 167602 AF 2 128: IP (tos 0x8, ttl 61, id 34442, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x103) >>>>>2. 136032 AF 2 128: IP (tos 0x8, ttl 61, id 8345, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x104) >>>>>2. 984665 AF 2 128: IP (tos 0x8, ttl 61, id 35456, offset 0, flags >>>>>[none], length: 128) A.B.C.D > E.F.G.H: ESP(spi=0x0858046f,seq=0x105) >>>>> >>>>> >>>>> >>>>> >>>>>From what I'm seeing host B just stops sending without any reason. At >>>> >>>>least I don't see any fragmented packets. The only thing I've seen is >>>>some packets doesn't get ack'ed by the receiver. >>>> >>>>These packets never get ack'ed: >>>>46320:47548(1228) >>>>50004:51232(1228) >>>>53688:54916(1228) >>>>57372:58600(1228) >>>>61056:62284(1228) >>>> >>>>On host A I dumped the following: >>>> >>>>tcpdump -netttvvi gif6 >>>> >>>> >>>>>1129985378.941282 AF 2 52: IP (tos 0x8, ttl 64, id 41637, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 45092 win 32542 <nop,nop,timestamp 574090240 >>>>>490857876> >>>>>1129985378.952628 AF 2 1280: IP (tos 0x8, ttl 64, id 14004, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>45092:46320(1228) ack 1330 win 33156 <nop,nop,timestamp 490857901 >>>>>574090210> >>>>>1129985378.952657 AF 2 52: IP (tos 0x8, ttl 64, id 23243, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 46320 win 33156 <nop,nop,timestamp 574090251 >>>>>490857901> >>>>>1129985378.958250 AF 2 1280: IP (tos 0x8, ttl 64, id 4306, offset 0, >>>>>flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>46320:47548(1228) ack 1330 win 33156 <nop,nop,timestamp 490857901 >>>>>574090210> >>>>>1129985378.971118 AF 2 1280: IP (tos 0x8, ttl 64, id 33534, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>47548:48776(1228) ack 1330 win 33156 <nop,nop,timestamp 490857920 >>>>>574090229> >>>>>1129985378.971137 AF 2 52: IP (tos 0x8, ttl 64, id 60095, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 48776 win 32542 <nop,nop,timestamp 574090270 >>>>>490857901> >>>>>1129985378.982488 AF 2 1280: IP (tos 0x8, ttl 64, id 11459, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>48776:50004(1228) ack 1330 win 33156 <nop,nop,timestamp 490857931 >>>>>574090240> >>>>>1129985378.982516 AF 2 52: IP (tos 0x8, ttl 64, id 33184, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 50004 win 33156 <nop,nop,timestamp 574090281 >>>>>490857931> >>>>>1129985378.987989 AF 2 1280: IP (tos 0x8, ttl 64, id 54180, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>50004:51232(1228) ack 1330 win 33156 <nop,nop,timestamp 490857931 >>>>>574090240> >>>>>1129985378.994231 AF 2 1280: IP (tos 0x8, ttl 64, id 24535, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>51232:52460(1228) ack 1330 win 33156 <nop,nop,timestamp 490857942 >>>>>574090251> >>>>>1129985378.994250 AF 2 52: IP (tos 0x8, ttl 64, id 30647, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 52460 win 32542 <nop,nop,timestamp 574090293 >>>>>490857931> >>>>>1129985379.012101 AF 2 1280: IP (tos 0x8, ttl 64, id 61397, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>52460:53688(1228) ack 1330 win 33156 <nop,nop,timestamp 490857960 >>>>>574090270> >>>>>1129985379.012132 AF 2 52: IP (tos 0x8, ttl 64, id 60550, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 53688 win 33156 <nop,nop,timestamp 574090311 >>>>>490857960> >>>>>1129985379.017754 AF 2 1280: IP (tos 0x8, ttl 64, id 28408, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>53688:54916(1228) ack 1330 win 33156 <nop,nop,timestamp 490857961 >>>>>574090270> >>>>>1129985379.023720 AF 2 1280: IP (tos 0x8, ttl 64, id 27558, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>54916:56144(1228) ack 1330 win 33156 <nop,nop,timestamp 490857972 >>>>>574090281> >>>>>1129985379.023741 AF 2 52: IP (tos 0x8, ttl 64, id 21502, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 56144 win 32542 <nop,nop,timestamp 574090322 >>>>>490857961> >>>>>1129985379.035333 AF 2 1280: IP (tos 0x8, ttl 64, id 18885, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>56144:57372(1228) ack 1330 win 33156 <nop,nop,timestamp 490857984 >>>>>574090293> >>>>>1129985379.035362 AF 2 52: IP (tos 0x8, ttl 64, id 59875, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 57372 win 33156 <nop,nop,timestamp 574090334 >>>>>490857984> >>>>>1129985379.040830 AF 2 1280: IP (tos 0x8, ttl 64, id 37252, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>57372:58600(1228) ack 1330 win 33156 <nop,nop,timestamp 490857984 >>>>>574090293> >>>>>1129985379.046576 AF 2 1280: IP (tos 0x8, ttl 64, id 18349, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>58600:59828(1228) ack 1330 win 33156 <nop,nop,timestamp 490857984 >>>>>574090293> >>>>>1129985379.046595 AF 2 52: IP (tos 0x8, ttl 64, id 43697, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 59828 win 32542 <nop,nop,timestamp 574090345 >>>>>490857984> >>>>>1129985379.064961 AF 2 1280: IP (tos 0x8, ttl 64, id 38300, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>59828:61056(1228) ack 1330 win 33156 <nop,nop,timestamp 490858013 >>>>>574090322> >>>>>1129985379.064993 AF 2 52: IP (tos 0x8, ttl 64, id 47539, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 61056 win 33156 <nop,nop,timestamp 574090364 >>>>>490858013> >>>>>1129985379.070688 AF 2 1280: IP (tos 0x8, ttl 64, id 30345, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>61056:62284(1228) ack 1330 win 33156 <nop,nop,timestamp 490858013 >>>>>574090322> >>>>>1129985379.076184 AF 2 1280: IP (tos 0x8, ttl 64, id 37536, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>62284:63512(1228) ack 1330 win 33156 <nop,nop,timestamp 490858014 >>>>>574090322> >>>>>1129985379.076202 AF 2 52: IP (tos 0x8, ttl 64, id 34201, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 63512 win 32542 <nop,nop,timestamp 574090375 >>>>>490858013> >>>>>1129985379.081680 AF 2 1280: IP (tos 0x8, ttl 64, id 20637, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>63512:64740(1228) ack 1330 win 33156 <nop,nop,timestamp 490858025 >>>>>574090334> >>>>>1129985379.081709 AF 2 52: IP (tos 0x8, ttl 64, id 59866, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 64740 win 33156 <nop,nop,timestamp 574090380 >>>>>490858025> >>>>>1129985379.087678 AF 2 1280: IP (tos 0x8, ttl 64, id 35213, offset >>>>>0, flags [none], length: 1280) 10.128.6.1.22 > 10.128.1.6.59762: . >>>>>64740:65968(1228) ack 1330 win 33156 <nop,nop,timestamp 490858036 >>>>>574090345> >>>>>1129985379.186906 AF 2 52: IP (tos 0x8, ttl 64, id 2465, offset 0, >>>>>flags [none], length: 52) 10.128.1.6.59762 > 10.128.6.1.22: . [tcp >>>>>sum ok] 1330:1330(0) ack 65968 win 33156 <nop,nop,timestamp 574090486 >>>>>490858036> >>>> >>>>tcpdump -netttvvi em1 host E.F.G.H >>>> >>>> >>>>>1129985379.064825 00:13:c4:fa:6c:20 > 00:c0:9f:46:ec:c7, ethertype >>>>>IPv4 (0x0800), length 1366: IP (tos 0x8, ttl 61, id 45003, offset 0, >>>>>flags [none], length: 1352) E.F.G.H > A.B.C.D: >>>>>ESP(spi=0x0e0dffaa,seq=0x3e) >>>>>1129985379.065024 00:c0:9f:46:ec:c7 > 00:13:c4:fa:6c:20, ethertype >>>>>IPv4 (0x0800), length 142: IP (tos 0x8, ttl 64, id 1195, offset 0, >>>>>flags [none], length: 128) A.B.C.D > E.F.G.H: >>>>>ESP(spi=0x029a41b4,seq=0x2f) >>>>>1129985379.070572 00:13:c4:fa:6c:20 > 00:c0:9f:46:ec:c7, ethertype >>>>>IPv4 (0x0800), length 1366: IP (tos 0x8, ttl 61, id 36820, offset 0, >>>>>flags [none], length: 1352) E.F.G.H > A.B.C.D: >>>>>ESP(spi=0x0e0dffaa,seq=0x3f) >>>>>1129985379.076069 00:13:c4:fa:6c:20 > 00:c0:9f:46:ec:c7, ethertype >>>>>IPv4 (0x0800), length 1366: IP (tos 0x8, ttl 61, id 44971, offset 0, >>>>>flags [none], length: 1352) E.F.G.H > A.B.C.D: >>>>>ESP(spi=0x0e0dffaa,seq=0x40) >>>>>1129985379.076233 00:c0:9f:46:ec:c7 > 00:13:c4:fa:6c:20, ethertype >>>>>IPv4 (0x0800), length 142: IP (tos 0x8, ttl 64, id 56964, offset 0, >>>>>flags [none], length: 128) A.B.C.D > E.F.G.H: >>>>>ESP(spi=0x029a41b4,seq=0x30) >>>>>1129985379.081565 00:13:c4:fa:6c:20 > 00:c0:9f:46:ec:c7, ethertype >>>>>IPv4 (0x0800), length 1366: IP (tos 0x8, ttl 61, id 24742, offset 0, >>>>>flags [none], length: 1352) E.F.G.H > A.B.C.D: >>>>>ESP(spi=0x0e0dffaa,seq=0x41) >>>>>1129985379.081741 00:c0:9f:46:ec:c7 > 00:13:c4:fa:6c:20, ethertype >>>>>IPv4 (0x0800), length 142: IP (tos 0x8, ttl 64, id 9390, offset 0, >>>>>flags [none], length: 128) A.B.C.D > E.F.G.H: >>>>>ESP(spi=0x029a41b4,seq=0x31) >>>>>1129985379.087562 00:13:c4:fa:6c:20 > 00:c0:9f:46:ec:c7, ethertype >>>>>IPv4 (0x0800), length 1366: IP (tos 0x8, ttl 61, id 48065, offset 0, >>>>>flags [none], length: 1352) E.F.G.H > A.B.C.D: >>>>>ESP(spi=0x0e0dffaa,seq=0x42) >>>>>1129985379.186945 00:c0:9f:46:ec:c7 > 00:13:c4:fa:6c:20, ethertype >>>>>IPv4 (0x0800), length 142: IP (tos 0x8, ttl 64, id 36315, offset 0, >>>>>flags [none], length: 128) A.B.C.D > E.F.G.H: >>>>>ESP(spi=0x029a41b4,seq=0x32) >>>> >>>>If I'm not misleaded, this also doesn't show any errors except the >>>>missing ack's. host B just stops sending. If there's an ack missing, >>>>doesn't have the sending host to just repeat the un-ack'ed packet? >>>> >>>>The IPSec tunnel does not die. Even shortly after the (scp) transfer >>>>stalls the tunnel itself is still usable (for small amounts of data). To >>>>make it more worse, when disabling pf at the senders side, the transfer >>>>works. I've tripple checked pflog for denied packets on both sides but >>>>pf didn't filter any packets out. >>>> >>>>When disabling the IPSec rules using `setkey -F; setkey -FP' on the >>>>tunnel for a moment, the scp transfer does not stall. So it's not a gif >>>>issue. >>>> >>>>It doesn't seem to be an MTU issue (pf has also the rule 'scrub in/out >>>>all no-df'), but what kind of issue is that?? Has anybody ever >>>>experienced similar things? Or am I misinterpreting the tcpdump output? >>>> >>>> >>>>Any help and hint is appreciated! Without an error message I'm lost. >>>> >>>>Volker >>>> >>>>_______________________________________________ >>>>freebsd-net@freebsd.org mailing list >>>>http://lists.freebsd.org/mailman/listinfo/freebsd-net >>>>To unsubscribe, send any mail to "[EMAIL PROTECTED]" >> >>_______________________________________________ >>freebsd-net@freebsd.org mailing list >>http://lists.freebsd.org/mailman/listinfo/freebsd-net >>To unsubscribe, send any mail to "[EMAIL PROTECTED]" > > _______________________________________________ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"